exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2016-09-09

GNU Transport Layer Security Library 3.4.15
Posted Sep 9, 2016
Authored by Simon Josefsson, Nikos Mavrogiannopoulos | Site gnu.org

GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.

Changes: Various updates.
tags | protocol, library
SHA-256 | eb2a013905f5f2a0cbf7bcc1d20c85a50065063ee87bd33b496c4e19815e3498
Asterisk Project Security Advisory - AST-2016-007
Posted Sep 9, 2016
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - The overlap dialing feature in chan_sip allows chan_sip to report to a device that the number that has been dialed is incomplete and more digits are required. If this functionality is used with a device that has performed username/password authentication RTP resources are leaked. This occurs because the code fails to release the old RTP resources before allocating new ones in this scenario. If all resources are used then RTP port exhaustion will occur and no RTP sessions are able to be set up.

tags | advisory
SHA-256 | 97fcad4b2cc395997d99694e3df652f77ddb75c1bf9f3258efb47206a678a1c1
Asterisk Project Security Advisory - AST-2016-006
Posted Sep 9, 2016
Authored by Mark Michelson | Site asterisk.org

Asterisk Project Security Advisory - Asterisk can be crashed remotely by sending an ACK to it from an endpoint username that Asterisk does not recognize. Most SIP request types result in an "artificial" endpoint being looked up, but ACKs bypass this lookup. The resulting NULL pointer results in a crash when attempting to determine if ACLs should be applied. This issue was introduced in the Asterisk 13.10 release and only affects that release.

tags | advisory
SHA-256 | 4fed701bc3c34b63cb35edd8fe1f32e85f372f14481d360d07df779759acb717
WordPress 4.5.3 Cross Site Scripting
Posted Sep 9, 2016
Authored by Han Sahin

WordPress version 4.5.3 suffers from a cross site scripting vulnerability when an uploaded image filename has a malicious payload inserted.

tags | exploit, xss
SHA-256 | 6c769e43df4a37ca6174acc074f7d745829325d0add7f2fe561108492c4e03bf
Tinycrypt.asm Training Ransomware Virus
Posted Sep 9, 2016
Authored by Mark Osborne

Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.

tags | tool, encryption, virus
SHA-256 | d69c41d85e494c771d84d2ee2805586148307dc2162ea290443e61ae27b7d432
PHPHolidays CMS 3.00.50 Cross Site Scripting
Posted Sep 9, 2016
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

PHPHolidays CMS version 3.00.50 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ec3150133f0f3b07a8098ae053fa6b285663542a7f84a2709a421d958f690b36
Samsung SystemUI fimg2d Null Pointer Dereference
Posted Sep 9, 2016
Authored by 0xr0ot

Samsung SystemUI fimg2d driver suffers from a null pointer dereference vulnerability.

tags | advisory
SHA-256 | 5078f08a5818485da8db3f5b0d45965d8daf96f6c90003d8eae14f1610f7bba2
WordPress Cubed Theme 1.2 CSRF / File Upload
Posted Sep 9, 2016
Authored by howucan

WordPress Cubed theme version 1.2 suffers from cross site request forgery and remote file upload vulnerabilities.

tags | exploit, remote, vulnerability, file upload, csrf
SHA-256 | 86f2497e0367824c9dd5a4049146dd41c477072edc56fbc5c5d715ba511da942
Airmail 3.0.2 Cross Site Scripting
Posted Sep 9, 2016
Authored by redrain

Airmail versions 3.0.2 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e837c607d6a7d9ebf722d675a20cd3638b87cf0db5ed41e550b667a54bd2dd95
Ubuntu Security Notice USN-3074-1
Posted Sep 9, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3074-1 - It was discovered that File Roller incorrectly handled symlinks. If a user were tricked into extracting a specially-crafted archive, an attacker could delete files outside of the extraction directory.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2016-7162
SHA-256 | 5b948c8a578f9cfe916b5e9781f7cd37efb94cb056ba0861e207ea91418563c9
Picosmos Shows 1.6.0 Stack Overflow
Posted Sep 9, 2016
Authored by Vulnerability Laboratory, ZwX | Site vulnerability-lab.com

Picosmos Shows version 1.6.0 suffers from a stack overflow vulnerability.

tags | exploit, overflow
SHA-256 | 42eb81f441816bae9b04734a8a89a41969976f78b42c703a66436a1024c488d8
WhatsApp DLL Hijacking
Posted Sep 9, 2016
Authored by Amir.ght

WhatsApp suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 5edfc503a7aaa97cdd3ee4b9e0a61279e5db0110de4e6e57333a56e62653ad04
HDWiKi 4.0.4 Cross Site Scripting
Posted Sep 9, 2016
Authored by indoushka

HDWiKi version 4.0.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7ee4f7159ea6f9c295aed5b1e75da8f3047ad897c2a34dccf73702d0608a0822
BugNET 1.6.315.0 Cross Site Scripting
Posted Sep 9, 2016
Authored by indoushka

BugNET version 1.6.315.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3bcb9c96eea1adda6065d3a66df78bb9b326405e72cfa98dec8654cd4cd948d2
WinSCP 5.9.1 DLL Hijacking
Posted Sep 9, 2016
Authored by Amir.ght

WinSCP version 5.9.1 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 2c331eb656448f5bc8c1847da248cc26185834f1c02580a4b12031193f2198d4
OoVoo 3.7.1 DLL Hijacking
Posted Sep 9, 2016
Authored by Amir.ght

OoVoo version 3.7.1 suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | d4e01ddd8f90c9a3711633817c0164f1245d6e3664f1779e2da00e8226a3bc9c
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close